تقييم الموضوع :
  • 6 أصوات - بمعدل 3.67
  • 1
  • 2
  • 3
  • 4
  • 5
XVolkolak
#1
XVolkolak




إقتباس :Unlike programs of this type, it does not use DebugAPI and other features of the operating system. Everything is emulated. You can safely unpack malware for further investigation without the risk of damaging the system.
All machine instructions are not executed on a real processor, so unpacking occurs regardless of the processor type and the operating system.
It is possible to unpack 64 bit files on 32 operating systems.
This build emulates the processors intel x86 and AMD64.
It supports unpacking 32 and 64 bit Windows executable files. If there is community interest, it will be possible to unpack other executable files (ELF, MSDOS, Mach-O) and other processors.

Due to its capabilities, with the correct manual setting, the program engine can be used to unpack almost any packer / tread.
However, this version of the program works in a fully automatic mode and can only unpack simple non-commercial unpackers such as:

UPX
ASPack
NsPack
Mpress
MEW
(Win) Upack
FSG
and some others.

The version of the program with the possibility of unpacking commercial protectors (such as VMProtect, ASProtect and others) will not appear in the public domain for obvious reasons.

The program is absolutely free for non-commercial and commercial use.

This version is for Windows. If you need a build for Linux, please let me know with the exact name of the operating system (for example Ubuntu 17.10 64 bit). The version for Linux is completely identical to the version of Windows.

The program is still in alpha status, so I would be grateful for all the comments on the program, as well as for links to files with simple packers. First of all, packed samples of malicious programs are of interest. Address for communication horsicq [at] gmail.com


https://www.dropbox.com/s/nziop8xznuu09ra/xvlk_win32_public_0.22.zip?dl=1
implicit conversion (think forward)

تم الشكر بواسطة: M!X0R , [email protected]
#2
مشكووور
لكن كيف الفك بها ؟
تم الشكر بواسطة:
#3
تجربة على الضاغط upx
[صورة مرفقة: mk6cpDz.gif]
implicit conversion (think forward)

تم الشكر بواسطة:


التنقل السريع :


يقوم بقرائة الموضوع: بالاضافة الى ( 1 ) ضيف كريم